Question

For affine cipher, the key is a = 17, b = 10 so the enciphering function...

For affine cipher, the key is a = 17, b = 10 so the enciphering function is

C(7,10)(p) = 17p + 10 mod 26.

a) Find the deciphering function for this cipher. Show your steps

b) If the ciphertext is AKV, what is the plaintext?

Homework Answers

Answer #1

a) Let denote plane text and denote cipher text.

Given the enciphering function

That is

Which implies

We have for any integer coprime to 26

Since 17 is coprime to 26, from above we get

Now

Then

b)

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
C Programming I have this function to i want to return the cipher text, but its...
C Programming I have this function to i want to return the cipher text, but its not working, can anyone try to see what i'm doing wrong. I need it to return the cipher text. char* vigenereCipher(char *plainText, char *k) { int i; char cipher; int cipherValue; int len = strlen(k); char *cipherText = (char *)malloc(sizeof(plainText) * sizeof(char)); //Loop through the length of the plain text string for (i = 0; i < strlen(plainText); i++) { //if the character is...
This question concerns block cipher modes. We will use a simple affine cipher, which can be...
This question concerns block cipher modes. We will use a simple affine cipher, which can be expressed in C as follows. char cipher(unsigned char block, char key) { return (key+11*block)%256; } Note that the block size is 8 bits, which is one byte (and one ASCII character). We will work with the fixed key 0x08. We now encrypt various plaintexts using modes for this cipher. In every case in which the mode requires an IV, the IV will be 0xAA....
Answer the following question: 1. a. Use an affine cipher x 7→ 3x + 1 (mod...
Answer the following question: 1. a. Use an affine cipher x 7→ 3x + 1 (mod 26) to encode “Baltimore”. b. Let a and b be integers. What does it mean to say a divides b? Provide a precise definition and include the proper notation. c. Let a, b, c, and n be integers with n 6= 0. Suppose that a ≡ b (mod n) and b ≡ c (mod n). Prove that a ≡ c (mod n). d. Use...
For solving the problems, you are required to use the following formalization of the RSA public-key...
For solving the problems, you are required to use the following formalization of the RSA public-key cryptosystem. In the RSA public-key cryptosystem, each participants creates his public key and secret key according to the following steps: ·       Select two very large prime number p and q. The number of bits needed to represent p and q might be 1024. ·       Compute                n = pq                           (n) = (p – 1) (q – 1). The formula for (n) is owing to...
Vigenère Cipher. In the Vigenère Cipher, we use a special keyword to encrypt a message. We...
Vigenère Cipher. In the Vigenère Cipher, we use a special keyword to encrypt a message. We represent each letter of the alphabet as a number from 0-25. In order, we add each letter from the keyword to the message and mod by 26. If the keyword is shorter than the message, we simply repeat the keyword. For example, lets say that the message is HOWSTUFFWORKS and the keyword is CIPHER. The following table shows how we can find the final...
When using calculator function key, please indicate what key was used . a. What type of...
When using calculator function key, please indicate what key was used . a. What type of distribution is X ~ U(5, 29) ? b. Draw the graph of the distribution (show the height of the distribution) X ~ U(5, 29). c. Find P(x>13) if X~U(5,29) e. Find the 60th percentile if X ~ U(5, 29)
1. Dexter wants to set up his own public keys. He chooses p = 23 and...
1. Dexter wants to set up his own public keys. He chooses p = 23 and q = 37 with e = 5. Answer the following using RSA cryptographic method: a) Encrypt the message ‘100’ and find the CIPHER number (C) to be sent. ‘100’ should be taken together as M while computing encryption [5 Marks] C = Me mod pq (Use This Formula) b) Find the decryption key ‘d’, using extended Euclidean GCD algorithm. [10 Marks] c) Now decrypt...
You are to create 17 subnets on a class B network with the IP address: 172.20.112.1?...
You are to create 17 subnets on a class B network with the IP address: 172.20.112.1? How many bits do you need to uniquely identify each subnet? (focus on the binary representation more so than the networking aspect of the question) : hint what is the minimum number of bits do you need to represent 17 different entities. (show all steps) Subtract 10 – 7 using 2’s complement (show all steps) Find the two’s complement of the following number:   10110111(show...
On python a) Create a dictionary with 5 to 10 key-values so that state is the...
On python a) Create a dictionary with 5 to 10 key-values so that state is the key and its capital is the value. Print the dictionary and its length. b) Create and print a list of states and a list of capitals. c) Ask the user for a state's name. Check to see if the state's name exists in the list of states. If it does, look up the state's name in the dictionary and print out its capital. If...
Consider the Cournot model with market demand function p(q_1, q_2)=17-q_1-q_2p(q1​,q2​)=17−q1​−q2​, and two different cost functions for...
Consider the Cournot model with market demand function p(q_1, q_2)=17-q_1-q_2p(q1​,q2​)=17−q1​−q2​, and two different cost functions for each firm: c_1(q_1)=q_1c1​(q1​)=q1​, c_2(q_2)=3q_2c2​(q2​)=3q2​. In the pure NE, firm 1 produces: and firm 2 produces: In equilibrium, the market price is: Show your steps. Remember to write down the profit function of each firm and solve for their best response functions. Which firm has a bigger market share? Explain.